Course Information

FieldValue
Course TitleCybersecurity and data protection
Course CodeM-225-04
LevelMaster
ECTS Credits6.00
Faculty/unitEngineering Faculty
FieldComputer and information sciences
Course TypeStandard
Course LeaderRevzina Elena - Mg. sc. comp. lecturer
AnnotationCybersecurity is a critically important field for business in every industry, especially given the proliferation of data breaches (more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). This course introduces the concept of cyber security and data protection, its interdisciplinary nature and its relation to nation, businesses, society and people. Participating students would gain knowledge of various principles of cybersecurity and data protection, as well as related technologies, tools, legal regulations and standards.
AimObtain an understanding of the role and principles of cybersecurity and data protection, as well as related technologies, tools, legal regulations and standards.
LO1Identify traits of cybercriminals and security experts, core data protection principles, cybercriminal methods, infosec policies and standards, and data protection laws.
LO2Usage of relevant technologies, products and procedures to protect data confidentiality; ensure data integrity and provide data high availability.
LO3Application of standards and frameworks associated with data protection and cybersecurity.
Required Literature
  • Brooks, Charles J., et al. Cybersecurity Essentials, John Wiley & Sons, Incorporated, 2018. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/tsilv/detail.action?docID=5507961.
  • Tanner, Nadean H.. Cybersecurity Blue Team Toolkit, John Wiley & Sons, Incorporated, 2019. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/tsilv/detail.action?docID=5747366.
  • Watkins S., Calder A. Information Security Risk Management for ISO 27001/ISO 27002. IT Governance Publishing, 2019.
  • Cisco Networking Academy On-line Materials. Cybersecurity Essentials ver.1.11.
  • Kim D., Solomon M.G. Fundamentals of Information Systems Security, 3rd Edition. Jones & Bartlett Learning, 2016.
  • Petrocelli, Thomas D. Data protection and information lifecycle management. Pearson Education, Inc, 2006.
  • IT Governance Privacy Team. EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition. IT Governance Publishing, 2020.
  • Phelps D.C., Gathegi J.N., Workman M. Information Security for Managers. Jones & Bartlett Learning, 2012.
Assessment MethodThe module consists of 2 assessments: Examination for 2 hours. The examination will contain theoretical questions and practical tasks. Portfolio (practical assignment) During module students should develop and complete individual works. The practical classes are adopted from CISCO Networking Academy, from the course dedicated to the cybersecurity. All items are subject of individual completion. The resit will be similar to the main sit.
Independent studyThe independent study is organised around reading/watching additional materials, which the academic staff will provide and publish. Additionally, practical task execution will involve preparation reports, which should be completed outside the campus.
Full-time
First Sit ElementsElement Weighting, %Group WorkLinks to Results
Reports50 LO2, LO3
Presentations50 LO1

contact us